Cryptology, -ography, -analysis Flashcards
reading hidden messages – a linguistic/ code-breaking approach.
Cryptology
Ito ung pagbasa ng crypto
the study of establishing a channel for secret communications. Focuses on creating secret codes. Writing hidden messages – a historical / forensic
approach.
Cryptography
Ito ung process sa paggawa ng Crypto
Crypto comes from a Greek word ____?
Kryptos
means hidden and Graphein means to write.
Kryptos
analyzing hidden messages – a statistical /
analytical approach and Is the extraction of the information from the coded
message
Cryptanalysis
ito ung pag-deeper analyze ng crypto
The person practicing Cryptanalysis is called a ____?
Cryptanalyst
Person ito
The process of remodeling information into
nonhuman readable form is named ____?
Encryption
The process of reversing encryption is named
____?
Decryption
The encrypted information is understood as
a ____?
Cipher
To determine the weak points of acryptographic system, it is important to attack the system. These attacks are called ____?
Cryptanalytic attacks
In this type of attack, some plaintext-cipher text pairs are already known. This attack is easier to use as a lot of information is already available.
Known-Plaintext Analysis (KPA)
ATTACKS
TYPES OF CRYPTANALYTIC ATTACKES
In this type of attack, the attacker
chooses random plaintexts and
obtains the corresponding cipher texts and tries to find the encryption key.
Chosen-Plaintext Analysis (CPA)
TYPES OF CRYPTANALYTIC ATTACKES
In this type of attack, only some cipher-text is known and the attacker tries to find the corresponding encryption key and plaintext. It’s the hardest to
implement.
Cipher text-Only Analysis (COA)
TYPES OF CRYPTANALYTIC ATTACKES
In this type of attack, attacker intercepts the message/key
between two communicating parties through a secured channel.
Man-In-The-Middle (MITM) attack
TYPES OF CRYPTANALYTIC ATTACKES
This attack is similar CPA. Here, the attacker requests the cipher texts of additional plaintexts
after they have cipher texts for some texts.
Adaptive Chosen-Plaintext Analysis (ACPA)
TYPES OF CRYPTANALYTIC ATTACKES
Is a very simple cipher tool used in ancient Greece, especially by the Spartans. Consists of a piece of parchment wrapped
around a rod or baton
Scytale
named after
Julius Caesar,is a type of mono-alphabetic
substitution cipher, which uses a cipher alphabet for encryption and decryption.
Caesar Cipher